%PDF-1.4 % 1 0 obj << /S /GoTo /D (section.1) >> endobj 4 0 obj (Introduction) endobj 5 0 obj << /S /GoTo /D (section.2) >> endobj 8 0 obj (Protection of Health Records) endobj 9 0 obj << /S /GoTo /D (subsection.2.1) >> endobj 12 0 obj (Current Proposals) endobj 13 0 obj << /S /GoTo /D (subsection.2.2) >> endobj 16 0 obj (Desired System Properties) endobj 17 0 obj << /S /GoTo /D (section.3) >> endobj 20 0 obj (Our Security Architecture) endobj 21 0 obj << /S /GoTo /D (section.4) >> endobj 24 0 obj (Discussion) endobj 25 0 obj << /S /GoTo /D (section.5) >> endobj 28 0 obj (Related Work) endobj 29 0 obj << /S /GoTo /D (section.6) >> endobj 32 0 obj (Conclusion) endobj 33 0 obj << /S /GoTo /D (section.7) >> endobj 36 0 obj (References) endobj 37 0 obj << /S /GoTo /D [38 0 R /Fit ] >> endobj 50 0 obj << /Length 5304 /Filter /FlateDecode >> stream xڽ<]6{PUtسκlmCq-Z=~/ (Mrc@4MGExMoS,"U.8K(W""J৽^Y_Q`^V(w$ a=REA-ЛsO_^,TEXUX>_Q ~{i{Btae ֽ8Xqr^zꞑO'm&3i6;$, 0:`0#*MDaT>,AeaV{2PoWo5]384'Qson46}¼J/6T` lOg=W ,MV?6*t*~h73 4Y]A[Q~8dp_@pi[=se愲^Ɔifgfǚ7vvU9r %.7u=+|DEU0*Ie~2˂kN(;Efi9A/cg`c6нN h5}ʂQWo?͟y 4A$KUeqZ;@lL[EvDa3AW|0<*1k?-ϳa=tCih8ăɢ pk5K7_pp 8NlgJ~jgB̩a[؇UjpKDmYq/ڰV #&ug&CGMttiTjnu!GձQB$JhC0(JwXE={> %L=qxkNT>f j:3"#s|gz&Xj> w0 gE+i;X Sʆ*o ;RA?G 'ꔳ0D =;M;jg:1 <GTf5ho .{Ӹ$PKЉ0xg,/qӜ=&8˸ ~Zypuo(`A哥I`Z8zec/b4rYp]OH5}KE ɲz j澏/yl8E>K A)Ym&13u ;@F7j`N#P*,BBiYW^мU(}4(eځE\ I5ޚ5Z>dTjU5>RSU_Xsf,hOx{